what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 55 RSS Feed

Files Date: 2010-07-28 to 2010-07-29

Secunia Security Advisory 40690
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a weakness in Sun Solaris, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
systems | solaris
SHA-256 | b527a8e9e4534cc5ef2c8d915b3b4d9fb3dbf3b0f14d0a63f7e1b88d77833406
Secunia Security Advisory 40755
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for turba. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | 0a49bac260e7bcfb28570c7177640737a3a2eaca6fa4e92b3a90471be5937e96
Secunia Security Advisory 40743
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can potentially be exploited by malicious people to disclose sensitive information or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | da06efe862e77be549b4fd698e003bb6af423494f3a23e5356ba276033c58161
Secunia Security Advisory 40764
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pidgin. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | fb1f8c0dde5a5eeec24be6d02057b7007ac13d3c6418fcb900048d0ae795462c
Secunia Security Advisory 40778
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libvirt. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users in a guest system to bypass certain security restrictions.

tags | advisory, local, vulnerability
systems | linux, fedora
SHA-256 | c2a87416e6f6ec6fef3471a5b6d86de5c25bac3faa289d8239394183e92d90a1
Secunia Security Advisory 38830
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in various Symantec products, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 9debe52cdd1a71b13d62020c7ca41cb28bedcd6fb97bc1aefe887e6b1f8e1190
Secunia Security Advisory 40681
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in JBoss Enterprise SOA Platform, which can be exploited by malicious users to gain escalated privileges and by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c44cd7a9f7f9ceee18bdabf837419fd7f8e53b331bd5eb03ac37a800d7159d67
Secunia Security Advisory 38704
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Lotus Notes, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 5afffc0f4497d3b6db8163c8b5cf0a69e1331c9924c0f61ba0a1b60265ddd235
Secunia Security Advisory 40747
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a vulnerability in multiple Cisco products, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | cisco
SHA-256 | b30f5ff3bfa581906660a5a0f49041e2b19f9f37a504a94110c67da58fde51cf
Secunia Security Advisory 40730
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in AIX, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | aix
SHA-256 | ca6852945ee44d5f35efe6e7537ceb2f643e95e373eb7e6398fc37baf4ec9c20
Secunia Security Advisory 40734
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Tivoli Directory Server, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
SHA-256 | d7e9f67b2b42b56cb44a644ed6c7e803fc95096eb1228a071624e7eabd6b3472
Secunia Security Advisory 40780
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in GNOME Display Manager, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
SHA-256 | 2474a31ed9118459f8c7f823085dc304429a8b4947c654153b73d3da2f059ed2
Secunia Security Advisory 40738
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Fujitsu Internet Navigware products, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
SHA-256 | 83fe18fcb63d84f4b0b54f331212546118c19bf6c961bc48f0c2d99710baa9e2
Debian Linux Security Advisory 2076-1
Posted Jul 28, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2076-1 - It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution.

tags | advisory, arbitrary, code execution
systems | linux, debian
advisories | CVE-2010-2547
SHA-256 | 791f0ef804a3c3e64ed5491c141bbc5664f78fd7be85e7e9b5037de9cc8f5f6a
Debian Linux Security Advisory 2075-1
Posted Jul 28, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2075-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2010-0182, CVE-2010-0654, CVE-2010-1205, CVE-2010-1208, CVE-2010-1211, CVE-2010-1214, CVE-2010-2751, CVE-2010-2753, CVE-2010-2754
SHA-256 | 092cd6fcae7be8a7336bf071b7e24a49ce0e54b973c54ce339cf692b2a748f70
Mandriva Linux Security Advisory 2010-141
Posted Jul 28, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-141 - The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value. The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \\xff\\xff security blob length in a Session Setup AndX request. The updated packages provides samba 3.4.8 which is not vulnerable to these issues.

tags | advisory, remote, denial of service, protocol
systems | linux, mandriva
advisories | CVE-2010-1635, CVE-2010-1642
SHA-256 | 7ee6ee198ea7396983a1a87bc200592fcb2964ad00adfeb360b908b1b52b81e4
Mandriva Linux Security Advisory 2010-140
Posted Jul 28, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-140 - This is a maintenance and security update that upgrades php to 5.3.3 for 2010.0/2010.1. Rewrote var_export() to use smart_str rather than output buffering, prevents data disclosure if a fatal error occurs. Fixed a possible resource destruction issues in shm_put_var(). Fixed a possible information leak because of interruption of XOR operator. Fixed a possible memory corruption because of unexpected call-time pass by reference and following memory clobbering through callbacks. Fixed a possible memory corruption in ArrayObject::uasort(). Fixed a possible memory corruption in parse_str(). Fixed a possible memory corruption in pack(). Fixed a possible memory corruption in substr_replace(). Fixed a possible memory corruption in addcslashes(). Fixed a possible stack exhaustion inside fnmatch(). Fixed a possible dechunking filter buffer overflow. Fixed a possible arbitrary memory access inside sqlite extension. Fixed string format validation inside phar extension. Fixed handling of session variable serialization on certain prefix characters. Fixed a NULL pointer dereference when processing invalid XML-RPC requests. Fixed SplObjectStorage unserialization problems. Fixed possible buffer overflows in mysqlnd_list_fields, mysqlnd_change_user. Fixed possible buffer overflows when handling error packets in mysqlnd. Additionally some of the third party extensions and required dependencies has been upgraded and/or rebuilt for the new php version.

tags | advisory, overflow, arbitrary, php
systems | linux, mandriva
advisories | CVE-2010-2531, CVE-2010-0397, CVE-2010-2225
SHA-256 | 263282a55164e1c13bdc2969faf4e31379a529b35efca4398c0ecb9b5e04c31a
PunBB 1.3.x / Pun_PM 1.2.6 Blind SQL Injection
Posted Jul 28, 2010
Authored by Dante90

PunBB versions 1.3.x and below with Pun_PM versions 1.2.6 and below remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 9ff6ffcaee243fedfd27fe9acfd20939ae8c73d2b9f5a8a337b7111a91f7b1f7
Joomla TTVideo 1.0 SQL Injection
Posted Jul 28, 2010
Authored by Salvatore Fresta

Joomla TTVideo component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 75200879a3bd5730366a523077e07e8ed34e61e4529878584f78e8c76dda9e10
Microsoft Visual Studio 6.0 Buffer Overflow
Posted Jul 28, 2010
Authored by MadjiX

Microsoft Visual Studio version 6.0 VCMUTL.dll unicode Active-X buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 8bc15f5936594babeb3a856d2c1f4be963657b17322ca8a826e481ded8df5dce
Admin Control Panel Finder 2.0
Posted Jul 28, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

AdminLoginFnder is a perl script that scans webservers for administrative login / control panel sections.

tags | tool, scanner, perl
systems | unix
SHA-256 | c6352f572295348d638d3e75f43a032da8cb5d74c8e64a799be012aef074e564
Facebook Bruteforcing Script 1.0
Posted Jul 28, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

This is a simple Facebook bruteforcing script that makes use of the Python Mechanize module and a wordlist.

tags | cracker, python
SHA-256 | 0ca36c97c9d96b5b5bc5d03574a420ab3e18f9fd869d9167d4517662c938c229
Internet Explorer 6/7 Denial Of Service
Posted Jul 28, 2010
Authored by Richard Leahy

Microsoft Internet Explorer versions 6 and 7 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 482425864ec290b53bf411b038cec6945fb29282b027f55a2cc19f295e8c9b55
No cON Name 2010 Congress Call For Papers
Posted Jul 28, 2010
Authored by No cON CFP | Site noconname.org

Call For Papers for the No cON Name 2010 Congress. This conference will be held in Barcelona, Spain, from October 18th through the 19th.

tags | paper, conference
SHA-256 | 0315821a267d528d259b07a4d5d4dda217b2daf8dc8bd6774317ad2a3ce38d4e
Social Media 2.0.0 Local File Inclusion
Posted Jul 28, 2010
Authored by OoN_Boy

Social Media version 2.0.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f9fff05d731f40d512a1f7e45fa71eb675f3ec9200b1ef5c368261c5745bc5b5
Page 2 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close